CN115063546A - Method for delineating range of security pillar from open air to underground - Google Patents

Method for delineating range of security pillar from open air to underground Download PDF

Info

Publication number
CN115063546A
CN115063546A CN202210639890.5A CN202210639890A CN115063546A CN 115063546 A CN115063546 A CN 115063546A CN 202210639890 A CN202210639890 A CN 202210639890A CN 115063546 A CN115063546 A CN 115063546A
Authority
CN
China
Prior art keywords
curve
dtm
pillar
security
range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210639890.5A
Other languages
Chinese (zh)
Other versions
CN115063546B (en
Inventor
杨念哥
陈树林
李亮
马涛
周科平
潘征
董秋平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Pangang Group Mining Co Ltd
Original Assignee
Central South University
Pangang Group Mining Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University, Pangang Group Mining Co Ltd filed Critical Central South University
Priority to CN202210639890.5A priority Critical patent/CN115063546B/en
Publication of CN115063546A publication Critical patent/CN115063546A/en
Application granted granted Critical
Publication of CN115063546B publication Critical patent/CN115063546B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • G06T17/05Geographic models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/13Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Geometry (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Graphics (AREA)
  • Remote Sensing (AREA)
  • Architecture (AREA)
  • Civil Engineering (AREA)
  • Structural Engineering (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Lining And Supports For Tunnels (AREA)

Abstract

本发明公开了一种露天转地下保安矿柱范围圈定方法,包括:确定安全塌陷带;与地表DTM面的拟合;提取拟合曲线;快速生成DTM面;形成H0‑mh水平剖面线;判断剖面线是否贯穿m号DTM面;获取保安矿柱理论边界;得到保安矿柱边界。本申请将软件、理论与实际工程相结合,相较于直接根据岩石移动角一步到位推导保安矿柱边界,该方法得到保安矿柱矿柱更平整和简单,也更便于保安矿柱留置施工,利于保安矿柱资源的回收。

Figure 202210639890

The invention discloses a method for delineating the range of an open-air to underground security mine pillar, comprising: determining a safety collapse zone; fitting with a surface DTM surface; extracting a fitting curve; quickly generating a DTM surface ; Determine whether the profile line runs through the m DTM surface; obtain the theoretical boundary of the security pillar; obtain the boundary of the security pillar. The application combines software, theory and practical engineering. Compared with directly deriving the boundary of the security pillar according to the rock movement angle in one step, the method obtains the security pillar and the pillar is smoother and simpler, and is more convenient for the construction of the security pillar indwelling. Conducive to the recovery of security pillar resources.

Figure 202210639890

Description

一种露天转地下保安矿柱范围圈定方法A method for delineating the range of open-air to underground security pillars

技术领域technical field

本发明属于采矿技术领域,尤其涉及一种露天转地下保安矿柱范围圈定方法。The invention belongs to the technical field of mining, and in particular relates to a method for delineating the range of an open-pit to underground security mine pillar.

背景技术Background technique

当地下的矿石被采出后,其原岩应力的平衡状态被破坏,从旧平衡被破坏向新平衡形成的过程中,岩层发生不同程度的移动和变形,应力重新分布。对于一些矿山的地表有建筑物和构筑物,因此地表不允许产生显著的不均匀沉降。国内每年因地下开采沉降导致巨大损失,为将损失降到最低,因此有效控制因矿山开采而导致的地表沉降势在必行。After the underground ore is mined, the equilibrium state of the original rock stress is destroyed. During the process from the destruction of the old equilibrium to the formation of the new equilibrium, the rock layers move and deform to varying degrees, and the stress is redistributed. For some mines, there are buildings and structures on the surface, so significant uneven settlement is not allowed on the surface. In order to minimize the loss, it is imperative to effectively control the surface subsidence caused by mining.

为有效避免地下开采对地面建筑物、构筑物造成破坏,预留保安矿柱是一种较为可靠的方法。但也会导致这一部分资源不能及时回采,同时如果保安矿柱范围圈定不合理,将严重恶化保安矿柱的开采技术条件,不利于保安矿柱资源回收,造成大量优质矿产资源的损失。In order to effectively avoid damage to ground buildings and structures caused by underground mining, it is a relatively reliable method to reserve security pillars. However, this part of the resources cannot be recovered in time. At the same time, if the scope of the security pillar is unreasonable, it will seriously deteriorate the mining technical conditions of the security pillar, which is not conducive to the recovery of the security pillar resources, resulting in the loss of a large number of high-quality mineral resources.

为提高矿产资源的回收率,保障不同水平生产能力的接续,延长矿山寿命,同时又能保证地表建筑物、构筑物的安全,因此一个既能实现经济又能保证安全的保安矿柱范围对矿山的发展意义重大。In order to improve the recovery rate of mineral resources, ensure the continuity of production capacity at different levels, prolong the life of the mine, and at the same time ensure the safety of surface buildings and structures, a security mine pillar range that can achieve both economy and safety is critical to the mine's safety. Development is significant.

发明内容SUMMARY OF THE INVENTION

本发明的主要目的在于提供一种露天转地下保安矿柱范围圈定方法,以解决金属矿山地下开采保安矿柱边界划定的问题,使其边界更加合理,提高了保安矿柱范围圈定的可靠性。The main purpose of the present invention is to provide a method for delineating the security pillar range from open-pit to underground, so as to solve the problem of delimiting the boundary of the security pillar in underground mining of metal mines, make the boundary more reasonable, and improve the reliability of the delineation of the security pillar range. .

为此,本发明实施例提供的露天转地下保安矿柱范围圈定方法,包括如下步骤:To this end, the method for delineating the scope of an open-air to underground security mine pillar provided by the embodiment of the present invention includes the following steps:

步骤1、确定安全塌陷带Step 1. Determine the safety collapse zone

针对保护对象,查看相应的标准与规范,确定安全塌陷带的位置和长度;For the protection object, check the corresponding standards and specifications to determine the position and length of the safety collapse belt;

步骤2、与地表DTM(数字地面模型)面的拟合Step 2. Fitting with the surface DTM (Digital Ground Model) surface

将步骤1得到的安全塌陷带与包括了露天采坑的地表DTM面进行拟合,使塌陷带上的点尽可能落在地表DTM面上;Fit the safe collapse zone obtained in step 1 with the surface DTM surface including the open pit, so that the points on the collapse zone fall on the surface DTM surface as much as possible;

步骤3:提取拟合曲线Step 3: Extract the fitted curve

在安全塌陷带与地表DTM面拟合的基础上,提取出拟合曲线;Based on the fitting of the safe collapse zone and the surface DTM surface, the fitting curve is extracted;

步骤4、拟合曲线向下扩展Step 4. Extend the fitting curve downward

将步骤3得到的拟合曲线按岩石移动角θ向下拓展2h的高度,得到推导曲线;其中,h为分段高度;The fitting curve obtained in step 3 is extended downward by the height of 2h according to the rock movement angle θ to obtain the derivation curve; wherein, h is the segment height;

步骤5、快速生成DTM面Step 5. Quickly generate DTM surface

在3DMine软件中基于步骤4获得的推导曲线与步骤3得到的拟合曲线,快速生成DTM面,并将其编号为m,m的初始值为1;Based on the derivation curve obtained in step 4 and the fitting curve obtained in step 3 in the 3DMine software, the DTM surface is quickly generated and numbered as m, and the initial value of m is 1;

步骤6、形成H0-mh水平剖面线Step 6. Form H 0 -mh horizontal section line

基于高程H0-mh切割剖面,从而形成H0-mh水平剖面线,H0为地表平均高程;Cut the section based on the elevation H 0 -mh to form the H 0 -mh horizontal section line, where H 0 is the average elevation of the surface;

步骤7、判断剖面线是否贯穿m号DTM面Step 7. Determine whether the section line runs through the m DTM surface

如果已贯穿,则将剖面线与溢出边界进行组合,形成新的拟合曲线,令m=m+1,并返回步骤4,在步骤5中将新的拟合曲线和新的拟合曲线的推导曲线共同形成DTM面,其它步骤依次进行;若剖面线未贯穿DTM面,则进入下一步;If it has penetrated, combine the section line with the overflow boundary to form a new fitting curve, let m=m+1, and return to step 4, in step 5, combine the new fitting curve and the new fitting curve The derivation curves together form the DTM surface, and the other steps are performed in sequence; if the section line does not penetrate the DTM surface, go to the next step;

步骤8、获取保安矿柱理论边界Step 8. Obtain the theoretical boundary of the security pillar

通过删除冗余点和丁字角对H0-mh水平剖面线进行修整,利用修整后的平面曲线推导出每一个水平的保安矿柱理论边界;The H 0 -mh horizontal section line is trimmed by deleting redundant points and T-shaped corners, and the theoretical boundary of each level security pillar is deduced by using the trimmed plane curve;

步骤9:得到保安矿柱边界Step 9: Get the security pillar boundary

根据实际工程布置、开采中长期计划以及简单和便于施工的原则对步骤8的边界进行优化,得到更合理的保安矿柱边界。The boundary of step 8 is optimized according to the actual engineering layout, the medium and long-term mining plan, and the principles of simplicity and ease of construction, so as to obtain a more reasonable security pillar boundary.

具体的,步骤1中所述安全塌陷带依据保护对象外轮廓形成的弧状曲线,其长度不小于安全沉陷带与保护对象距离的5倍。Specifically, the arc-shaped curve formed by the safety subsidence belt in step 1 according to the outer contour of the protection object, the length of which is not less than 5 times the distance between the safety subsidence belt and the protection object.

具体的,步骤2中所述地表DTM面的范围大于矿床范围。Specifically, the range of the surface DTM surface described in step 2 is larger than the range of the ore deposit.

具体的,步骤2中塌陷带上的点至少有90%落在地表DTM面上。Specifically, at least 90% of the points on the collapsed zone in step 2 fall on the surface DTM surface.

具体的,步骤7所述溢出边界为剖面线与两个曲线相交后,水平高程较大曲线和水平高程较小值曲线交点左侧或右侧的部分。Specifically, the overflow boundary in step 7 is the part on the left or right of the intersection of the curve with a larger horizontal elevation and the curve with a smaller horizontal elevation after the section line intersects the two curves.

具体的,步骤9中实际工程包括开拓工程、采准工程、矿山中长期规划以及地质构造。Specifically, the actual engineering in step 9 includes development engineering, mining accuracy engineering, medium and long-term mine planning, and geological structure.

具体的,步骤1中保护对象包括建构筑物、道路以及其它自然保护景观。Specifically, the protected objects in step 1 include structures, roads and other natural protected landscapes.

与现有技术相比,本发明至少一个实施例具有如下有益效果:本发明将获取的塌陷带与地表的DTM面进行拟合,充分考虑了地表走势的变化和露天开采的影响,利用3DMine功能和人为修正,保证了保安矿柱理论边界的可靠,并基于实际工程的布置情况对理论边界的优化,得到更加便于施工的保安矿柱边界。Compared with the prior art, at least one embodiment of the present invention has the following beneficial effects: the present invention fits the obtained collapse zone with the DTM surface of the surface, fully considers the change of the surface trend and the influence of open-pit mining, and utilizes the 3DMine function. And artificial correction to ensure the reliability of the theoretical boundary of the security pillar, and the optimization of the theoretical boundary based on the layout of the actual project, to obtain the security pillar boundary that is more convenient for construction.

综上,本发明将软件、理论与实际工程相结合,相较于直接根据岩石移动角一步到位推导保安矿柱边界,该方法得到保安矿柱矿柱更平整和简单,也更便于保安矿柱留置施工,利于保安矿柱资源的回收,具备安全、经济和适用等特点。To sum up, the present invention combines software, theory and practical engineering. Compared with directly deriving the boundary of the security pillar according to the rock movement angle in one step, the method is more flat and simple to obtain the security pillar, and is more convenient for the security pillar. Indwelling construction is conducive to the recovery of security pillar resources, and has the characteristics of safety, economy and applicability.

附图说明Description of drawings

为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings used in the description of the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort.

图1是本发明实施例提供的露天转地下保安矿柱范围圈定方法流程图;Fig. 1 is the flow chart of the method for delineating the scope of the open-air to underground security mine pillar provided by the embodiment of the present invention;

图2是本发明实施例确定的安全塌陷带示意图;2 is a schematic diagram of a safety collapse zone determined in an embodiment of the present invention;

图3是本发明实施例涉及的安全塌陷带与实际DTM面的拟合示意图;Fig. 3 is the fitting schematic diagram of the safety collapse zone involved in the embodiment of the present invention and the actual DTM surface;

图4是本发明实施例获得的拟合曲线图;Fig. 4 is the fitting curve diagram that the embodiment of the present invention obtains;

图5是本发明实施例获得的拓展曲线图;Fig. 5 is the expansion curve diagram that the embodiment of the present invention obtains;

图6是本发明实施例利用拟合曲线和拓展曲线生成1号DTM面示意图;Fig. 6 is the schematic diagram of generating No. 1 DTM surface by using the fitting curve and the expansion curve according to the embodiment of the present invention;

图7是本发明实施例基于高程1570m切割剖面示意图;7 is a schematic diagram of a cut section based on an elevation of 1570 m according to an embodiment of the present invention;

图8是本发明实施例涉及的组合曲线示意图;8 is a schematic diagram of a combination curve involved in an embodiment of the present invention;

图9是本发明实施例涉及的基于高程1490m切割剖面示意图。FIG. 9 is a schematic diagram of a cut section based on an elevation of 1490 m involved in an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

在本发明的描述中,需要理解的是,术语“中心”、“纵向”、“横向”、“长度”、“宽度”、“厚度”、“上”、“下”、“前”、“后”、“左”、“右”、“竖直”、“水平”、“顶”、“底”“内”、“外”、“顺时针”、“逆时针”、“轴向”、“径向”、“周向”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", " Rear, Left, Right, Vertical, Horizontal, Top, Bottom, Inner, Outer, Clockwise, Counterclockwise, Axial, The orientations or positional relationships indicated by "radial direction", "circumferential direction", etc. are based on the orientations or positional relationships shown in the accompanying drawings, which are only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying the indicated devices or elements. It must have a specific orientation, be constructed and operate in a specific orientation, and therefore should not be construed as a limitation of the present invention.

此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本发明的描述中,“多个”的含义是两个或两个以上,除非另有明确具体的限定。In addition, the terms "first" and "second" are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature defined as "first" or "second" may expressly or implicitly include one or more of that feature. In the description of the present invention, "plurality" means two or more, unless otherwise expressly and specifically defined.

某地下铁矿矿石属于中品位高硫低磷钒钛磁铁矿,富含钒钛资源,开采价值极高。矿体走向近东西,倾向北,倾角50°~60°,矿体呈单斜层状、似层状及透镜状产出。依据开采技术条件,该地下铁矿前期采用露天开采,目前矿山已经转入地下开采阶段,所采用的采矿方法为无底柱分段崩落法,分层高度为20m,由于矿体正上方存在该地区公路的两段路段,分别位于矿体北部及矿体西部,以及地表部分建构筑物离开采岩层移动范围较近,考虑到公路及地表建构筑物的安全以及露天边坡的稳定性,因此需对其保安矿柱的范围进行确定。本发明提供了一种露天转地下保安矿柱范围圈定方法,如图1所示,该实施例按照如下步骤进行:An underground iron ore is a medium-grade, high-sulfur, low-phosphorus vanadium-titanium magnetite, rich in vanadium-titanium resources and extremely valuable for mining. The ore body strikes nearly east-west, dips to the north, and has a dip angle of 50° to 60°. According to the mining technical conditions, the underground iron ore used open-pit mining in the early stage, and the mine has been transferred to the underground mining stage. The two sections of the regional highway are located in the northern part of the ore body and the western part of the ore body, and some structures on the surface are relatively close to the moving range of the mining layer. The scope of its security pillar is determined. The present invention provides a method for delineating the range of open-air to underground security pillars. As shown in FIG. 1 , this embodiment is carried out according to the following steps:

步骤1:确定安全塌陷带Step 1: Determine Safe Collapse Zones

安全塌陷带依据保护对象外轮廓形成的弧状曲线,其长度不小于安全沉陷带与保护对象距离的5倍,且具有代表性。本实施例中,针对公路保护对象,根据需要保护段的公路,查看相应的标准与规范,确定允许塌陷带的距离公路外轮廓20m,且塌陷带的长度为1311m,如图2所示。The safety subsidence belt is an arc-shaped curve formed according to the outer contour of the protection object, and its length is not less than 5 times the distance between the safety subsidence belt and the protection object, and is representative. In this embodiment, for the highway protection object, according to the highway of the protected section, check the corresponding standards and specifications, and determine that the allowable collapse zone is 20m away from the outer contour of the highway, and the length of the collapse zone is 1311m, as shown in Figure 2.

步骤2:与地表DTM面的拟合Step 2: Fitting with the surface DTM surface

该矿山为露天转地下的矿山,因此在地表存在露天采坑,因此将步骤1得到的安全塌陷带与包括了露天采坑的地表DTM面进行拟合,使塌陷带上的点至少有90%落在DTM面上,地表DTM面的范围大于矿床范围,如图3所示。The mine is an open pit to underground mine, so there are open pits on the surface. Therefore, the safe collapse zone obtained in step 1 is fitted with the surface DTM surface including the open pit, so that at least 90% of the points on the collapse zone are fitted. Falling on the DTM surface, the extent of the surface DTM surface is larger than that of the deposit, as shown in Figure 3.

步骤3:提取拟合曲线Step 3: Extract the fitted curve

在步骤2的基础上,提取出拟合曲线,如图4所示。On the basis of step 2, the fitting curve is extracted, as shown in Figure 4.

步骤4:拟合曲线向下扩展。将步骤3得到的拟合曲线按岩石移动角60°向下拓展40m高度,得到推导曲线,如图5所示。Step 4: The fitted curve is extended downwards. The fitting curve obtained in step 3 is extended downward by a height of 40m according to the rock movement angle of 60°, and the derivation curve is obtained, as shown in Figure 5.

步骤5:快速生成DTM面Step 5: Quickly Generate DTM Surfaces

在3DMine中基于生成DTM表面的功能将步骤4中推曲线与步骤3得到的拟合曲线快速生成DTM面,并将其编号为m(m的初始值为1),如图6所示。Based on the function of generating DTM surface in 3DMine, the DTM surface is quickly generated by the push curve in step 4 and the fitting curve obtained in step 3, and it is numbered as m (the initial value of m is 1), as shown in Figure 6.

步骤6:形成1570m水平剖面线Step 6: Form the 1570m Horizontal Section Line

基于高程1570m切割1号DTM面,从而形成1570m水平剖面线,如图7所示。Based on the elevation of 1570m, the No. 1 DTM face is cut to form a horizontal section line of 1570m, as shown in Figure 7.

步骤7:判断剖面线是否贯穿1号DTM面Step 7: Determine whether the section line runs through the No. 1 DTM surface

1570m水平剖面线已贯穿1号DTM面,因此需要将剖面线与溢出边界进行组合,形成新的拟合曲线(组合线),并对新的拟合曲线使用清理和查错功能,溢出边界为剖面与两个曲线(拟合曲线和推导曲线)相交后,水平高程较大曲线和水平高程较小值曲线交点左(右)侧的部分,如图7和图8所示。The 1570m horizontal section line has passed through the No. 1 DTM surface, so it is necessary to combine the section line with the overflow boundary to form a new fitting curve (combined line), and use the cleaning and error checking functions for the new fitting curve. The overflow boundary is After the profile intersects with two curves (fitted curve and derived curve), the part on the left (right) side of the intersection of the curve with larger horizontal elevation and the curve with smaller horizontal elevation is shown in Figures 7 and 8.

将验证合理后的拟合曲线返回到步骤4,开始一个新循环。在步骤5中是将1570m水平形成新的拟合曲线与根据该新的拟合曲线形成的推导曲线共同生成2号DTM面,按照步骤和判断标准严格执行流程,当进行到1490m水平形成切割剖面线时,该剖面线未贯穿对应的DTM面,因此进入下一步操作,如图9所示。Return the fit curve after verification to step 4 to start a new cycle. In step 5, a new fitting curve is formed at the 1570m level and the derivation curve formed according to the new fitting curve is used to generate the No. 2 DTM surface. The process is strictly implemented according to the steps and judgment standards. When the 1490m level is reached, a cutting section is formed. When the line is drawn, the section line does not penetrate the corresponding DTM surface, so the next step is entered, as shown in Figure 9.

步骤8:获取保安矿柱理论边界Step 8: Obtain the theoretical boundary of the security pillar

对高程为1490m水平的剖面线进行用清理和查错,删除冗余点,删去钉子角(角度小于5°),修整后的平面曲线作为推导每个开采水平保安矿柱边界的初始线。计算出每个开采水平与1490m水平的高差。按照计算出的每一个高差值,将修整后的1490m水平剖面线自上而下以60°岩石移动角推导至每一个开采水平,此时每个水平得到的曲线即为保安矿柱理论边界。The profile line with an elevation of 1490m is used for cleaning and error checking, redundant points are deleted, and the nail angle (the angle is less than 5°) is deleted, and the trimmed plane curve is used as the initial line for deriving the boundary of each mining level security pillar. Calculate the height difference between each mining level and the 1490m level. According to each calculated height difference, the trimmed 1490m horizontal section line is deduced to each mining level from top to bottom with a rock movement angle of 60°. At this time, the curve obtained at each level is the theoretical boundary of the security pillar. .

步骤9:得到保安矿柱边界Step 9: Get the security pillar boundary

在确保安全的情况下,根据该矿山的现有工程以及未来的主要工程布置计划以及地质构造,对保安矿柱理论边界进行优化。优化的具体要求为:(1)在可能的情况下,边界线段由为横平竖直的折线,且折线尽可能少;(2)每个水平的重要工程和设施优先;(3)边界简单且保安矿柱范围内高品位矿石少的原则,通过以上的过程就得到了该铁矿每个水平的实际保安矿柱范围。Under the condition of ensuring safety, the theoretical boundary of the security pillar is optimized according to the existing project of the mine and the main project layout plan and geological structure in the future. The specific requirements for optimization are: (1) Where possible, the boundary line segments should be horizontal, flat and vertical polylines, and the number of polylines should be as few as possible; (2) Important projects and facilities at each level are given priority; (3) The boundaries are simple and According to the principle of less high-grade ore within the scope of the security pillar, the actual security pillar range of each level of the iron ore can be obtained through the above process.

本发明将软件、理论与实际工程相结合,相较于直接根据岩石移动角一步到位推导保安矿柱边界的方法,该方法得到保安矿柱矿柱更平整和简单,也更便于保安矿柱留置施工,利于保安矿柱资源的回收。本发明具备安全、经济和适用等特点。Compared with the method of directly deriving the boundary of the security pillar according to the rock movement angle in one step, the method combines software, theory and practical engineering, and the method obtains the security pillar and the pillar is smoother and simpler, and is more convenient for the retention of the security pillar Construction is conducive to the recovery of security pillar resources. The invention has the characteristics of safety, economy and applicability.

上述本发明所公开的任一技术方案除另有声明外,如果其公开了数值范围,那么公开的数值范围均为优选的数值范围,任何本领域的技术人员应该理解:优选的数值范围仅仅是诸多可实施的数值中技术效果比较明显或具有代表性的数值。由于数值较多,无法穷举,所以本发明才公开部分数值以举例说明本发明的技术方案,并且,上述列举的数值不应构成对本发明创造保护范围的限制。Unless otherwise stated in any of the technical solutions disclosed in the present invention, if it discloses a numerical range, then the disclosed numerical range is a preferred numerical range, and any person skilled in the art should understand that: the preferred numerical range is only Among the many implementable numerical values, the technical effect is relatively obvious or representative. Since the numerical values are too numerous to be exhaustive, only some numerical values are disclosed in the present invention to illustrate the technical solutions of the present invention, and the above-mentioned numerical values shall not constitute a limitation on the protection scope of the present invention.

同时,上述本发明如果公开或涉及了互相固定连接的零部件或结构件,那么,除另有声明外,固定连接可以理解为:能够拆卸地固定连接(例如使用螺栓或螺钉连接),也可以理解为:不可拆卸的固定连接(例如铆接、焊接),当然,互相固定连接也可以为一体式结构(例如使用铸造工艺一体成形制造出来)所取代(明显无法采用一体成形工艺除外)。At the same time, if the above-mentioned invention discloses or involves parts or structural parts that are fixedly connected to each other, then, unless otherwise stated, fixed connection can be understood as: detachable fixed connection (for example, using bolts or screws), or It is understood as: non-removable fixed connection (such as riveting, welding), of course, the mutual fixed connection can also be replaced by an integral structure (such as using a casting process to integrally form) (except that it is obviously impossible to use an integral forming process).

另外,上述本发明公开的任一技术方案中所应用的用于表示位置关系或形状的术语除另有声明外其含义包括与其近似、类似或接近的状态或形状。本发明提供的任一部件既可以是由多个单独的组成部分组装而成,也可以为一体成形工艺制造出来的单独部件。In addition, unless otherwise stated, the terms used in any of the technical solutions disclosed in the present disclosure used to represent positional relationships or shapes include states or shapes that are similar to, similar to, or close to. Any component provided by the present invention may be assembled from a plurality of individual components, or may be a single component manufactured by an integral molding process.

上述实施例仅仅是清楚地说明本发明所作的举例,而非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里也无需也无法对所有的实施例予以穷举。而由此所引申出的显而易见的变化或变动仍处于本发明的保护范围之中。The above-mentioned embodiments are only examples to clearly illustrate the present invention, and are not intended to limit the embodiments. For those of ordinary skill in the art, changes or modifications in other different forms can also be made on the basis of the above description. Neither need nor can all embodiments be exhaustive here. And the obvious changes or changes derived from this are still within the protection scope of the present invention.

Claims (6)

1. A method for delineating the range of an open pit to an underground security pillar is characterized by comprising the following steps:
step 1, determining a safety collapse zone
Aiming at a protected object, checking corresponding standards and specifications, and determining the position and the length of a safety collapse zone;
step 2, fitting with a ground surface DTM surface
Fitting the safety collapse zone obtained in the step (1) with a surface DTM surface comprising an open pit so that points on the collapse zone fall on the surface DTM surface as far as possible;
and step 3: extracting fitting curves
Extracting a fitting curve on the basis of fitting the safe collapse zone and the ground surface DTM surface;
step 4, downward expansion of the fitted curve
Expanding the fitted curve obtained in the step 3 downwards by a height of 2h according to the rock movement angle theta to obtain a derivation curve; wherein h is the segment height;
step 5, rapidly generating DTM surface
Rapidly generating a DTM surface in 3DMine software based on the derivation curve obtained in the step 4 and the fitting curve obtained in the step 3, numbering the DTM surface as m, and setting the initial value of m as 1;
step 6, forming H 0 Horizontal section line of-mh
Based on elevation H 0 Mh cutting DTM face forming H 0 Horizontal section line of-mh, H 0 The average elevation of the earth surface;
step 7, judging whether the section line penetrates through the DTM surface
If the curve is intersected, combining the section line and the overflow boundary to form a new fitting curve, making m equal to m +1, returning to the step 4, forming a DTM surface by the new fitting curve and a derivation curve of the new fitting curve in the step 5, and sequentially performing other steps; if the section line does not penetrate through the DTM surface, entering the next step;
the overflow boundary is a part on the left side or the right side of the intersection point of the curve with the large horizontal elevation and the curve with the small horizontal elevation after the section line is intersected with the two curves;
step 8, obtaining the theoretical boundary of the security pillar
By deleting redundant point and t-corner pairs H 0 -mh horizontal section lines are trimmed, and each horizontal security pillar theoretical boundary is deduced by using the trimmed plane curves;
and step 9: obtaining security pillar boundaries
And (4) optimizing the boundary of the step (8) according to the actual engineering arrangement, medium and long term mining plan and the principle of simplicity and convenience in construction to obtain a more reasonable boundary of the security pillar.
2. The method for delineating the range of an open-pit to underground security pillar according to claim 1, wherein: in the step 1, the length of the arc-shaped curve formed by the safety collapse zone according to the outer contour of the protected object is not less than 5 times of the distance between the safety collapse zone and the protected object.
3. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: and 2, the range of the surface DTM surface is larger than the range of the ore deposit.
4. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: at least 90% of the points on the collapsed zone in step 2 fall on the surface DTM surface.
5. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: and 9, the actual engineering comprises development engineering, mining accurate engineering, mine medium and long term planning and geological structure.
6. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: the protection objects in the step 1 comprise building structures, roads and other natural protection landscapes.
CN202210639890.5A 2022-06-08 2022-06-08 A method for defining the range of safety pillars in open-pit to underground mining Active CN115063546B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210639890.5A CN115063546B (en) 2022-06-08 2022-06-08 A method for defining the range of safety pillars in open-pit to underground mining

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210639890.5A CN115063546B (en) 2022-06-08 2022-06-08 A method for defining the range of safety pillars in open-pit to underground mining

Publications (2)

Publication Number Publication Date
CN115063546A true CN115063546A (en) 2022-09-16
CN115063546B CN115063546B (en) 2024-04-02

Family

ID=83199929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210639890.5A Active CN115063546B (en) 2022-06-08 2022-06-08 A method for defining the range of safety pillars in open-pit to underground mining

Country Status (1)

Country Link
CN (1) CN115063546B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007264952A (en) * 2006-03-28 2007-10-11 Fujitsu Fip Corp Method for generating mesh for ground analysis and mesh generation program for ground analysis
CN103047970A (en) * 2012-12-18 2013-04-17 中国矿业大学(北京) Method for determining damage boundary of subsided farmland
CN106339528A (en) * 2016-08-09 2017-01-18 鞍钢集团矿业有限公司 A method for predicting the range of surface movement induced by underground mining of side walls in open-pit iron mines
KR101820126B1 (en) * 2017-10-26 2018-01-18 태양정보시스템(주) Error range adjustment drawing system using real time correcting of spatial imagery dawing image
CN111695790A (en) * 2020-05-26 2020-09-22 中钢集团山东矿业有限公司 Mining method for security pillar
CN111750822A (en) * 2019-10-31 2020-10-09 河南理工大学 A collaborative dynamic prediction method for coal mining-induced overburden and surface subsidence

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007264952A (en) * 2006-03-28 2007-10-11 Fujitsu Fip Corp Method for generating mesh for ground analysis and mesh generation program for ground analysis
CN103047970A (en) * 2012-12-18 2013-04-17 中国矿业大学(北京) Method for determining damage boundary of subsided farmland
CN106339528A (en) * 2016-08-09 2017-01-18 鞍钢集团矿业有限公司 A method for predicting the range of surface movement induced by underground mining of side walls in open-pit iron mines
KR101820126B1 (en) * 2017-10-26 2018-01-18 태양정보시스템(주) Error range adjustment drawing system using real time correcting of spatial imagery dawing image
CN111750822A (en) * 2019-10-31 2020-10-09 河南理工大学 A collaborative dynamic prediction method for coal mining-induced overburden and surface subsidence
CN111695790A (en) * 2020-05-26 2020-09-22 中钢集团山东矿业有限公司 Mining method for security pillar

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
杨宇江;李元辉;尹国光;韩洪江;: "露天转地下开采境界矿柱安全厚度稳定性分析", 东北大学学报(自然科学版), no. 07, 15 July 2011 (2011-07-15) *
杨鹏;张东红;张兵;张晋军;王贻明;: "谦比希铜矿露天转地下开采保安矿柱稳定性分析", 化工矿物与加工, no. 03, 15 March 2017 (2017-03-15) *
管佳林: "深部地压分析及安全开采顺序研究", 《中国优秀硕士学位论文全文数据库工程科技Ⅰ辑》, 31 May 2014 (2014-05-31), pages 021 - 145 *
邓红卫;胡普仑;周科平;杨念哥: "采场结构参数敏感性正交数值模拟试验研究", 《中南大学学报(自然科学版)》, 26 June 2013 (2013-06-26), pages 2463 - 2469 *

Also Published As

Publication number Publication date
CN115063546B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
US20240346758A1 (en) Mine digital model construction method based on three-dimensional point cloud database
CN105138788B (en) A kind of road threedimensional model Full Parameterized method for building up
CN101737061B (en) Method for constructing double-arch tunnel by rebuilding and expanding existing single-hole tunnel
CN107092740A (en) A kind of old goaf residual deformation method for predicting of severe inclined thick coal seam
CN112488455A (en) Slope stability analysis and evaluation method, system, medium, equipment and terminal
CN101598023A (en) Control method of shield tunnel axis when there is underground structure near the side
CN102587982B (en) Underground salt cavern gas storage groups and method for constructing same
CN103628876A (en) Harmonious mining method for block-type dip stripes in deep spanned mining areas of steep inclined seam
CN115809498A (en) A Calculation Method for Longitudinal Deformation of Deep-buried Shield Tunnel Passing Through Existing Lines
CN113536414A (en) Rock slope stability analysis method, system and medium based on three-dimensional modeling
CN114592519A (en) The method of zoning and dividing the engineering impact of foundation pit excavation on the existing tunnel
CN107748928A (en) A kind of mine based on spatial analysis moves water yield computational methods and system
CN105389451A (en) Timely accurate modeling method for unmanned mining working face
CN107313430A (en) The deep big foundation pit subregion construction method of three face Nearby Structures
CN110700285B (en) A three-dimensional design method for slowing down the surface of the loose layer slope in an open-pit mine
Ma et al. Displacement characteristics for a “π” shaped double cross-duct excavated by cross diaphragm (CRD) method
CN115063546A (en) Method for delineating range of security pillar from open air to underground
CN110469348B (en) BIM technology-based underground tunnel large curve turning steel grid arrangement method
CN211623426U (en) Safe and efficient hidden broken residual ore mining structure based on extra-pulse mining and quasi-exploration mining combination
CN110671110A (en) Extravenous mining and exploration mining combined concealed broken residual ore mining structure and mining method thereof
CN114790888B (en) A fine geological modeling method under offshore irregular mixed sparse well pattern conditions
CN110630265B (en) A layered mining method for huge thick coal seams that controls the subsidence of surface benches
CN111680261A (en) Setting method and setting system for protecting coal pillar
CN114491758B (en) A method for calculating water pressure on shaft wall based on seepage volume
CN113032887B (en) Method for realizing precise calibration and detection of super-large chamber based on VULCAN platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant